You are on page 1of 16

Decision Support Systems 66 (2014) 36–51

Contents lists available at ScienceDirect

Decision Support Systems


journal homepage: www.elsevier.com/locate/dss

Decision-making in IT service management: a simulation based approach


Elena Orta ⁎, Mercedes Ruiz, Nuria Hurtado, David Gawn
Department of Computer Science and Engineering, University of Cadiz, C/Chile, 1, 11003 Cadiz, Spain

a r t i c l e i n f o a b s t r a c t

Article history: Simulation modeling is widely used to support decision-making in different business areas and management
Received 2 August 2013 tasks. Given the growing importance for real-world organizations to improve Information Technology Service
Received in revised form 11 April 2014 Management (ITSM), this paper focuses on the application of these techniques to support decision-making in
Accepted 3 June 2014
this field. A review of published research articles that describe an application case has been conducted and it
Available online 11 June 2014
shows that different simulation approaches are extensively used to solve particular problems in the context of
Keywords:
several processes. However, in these works there is no evidence of a systematic use of both ITSM frameworks
Decision support systems and simulation model development methodologies. Given their importance to build valid simulation models,
Simulation modeling this paper proposes a novel decision-making framework whose main component is a specific methodology to
IT services management systematically build simulation models that help solve real-world organization problems applying ITIL
ITIL recommendations. To illustrate the usefulness of this framework, two application cases in the context of the
Incident management ITIL capacity management and incident management processes are summarized. The model simulations provide
Capacity management information about the process results, performance and behavior with different process configurations. More-
over, optimization experiments allow managers to determine the optimal process configuration that meets the
established objectives.
© 2014 Elsevier B.V. All rights reserved.

1. Introduction necessary to make very important and difficult decisions [71–75].


Specific examples of such decisions are as follows: a) What changes to
Information Technology Service Management (ITSM) refers to the make in process and service management strategy configurations to im-
implementation and management of quality IT services that meet the prove process results, behavior and performance; and b) Determining
needs of a business. ITSM is performed by IT service providers through the process configurations that optimize the process results and meet
an appropriate mix of people, processes and IT [41]. This discipline is the organization objectives, among others. Decision Support Systems
focused on providing a framework to structure IT-related activities (DSS) help managers make better decisions in this field [12,17,23,48,
and the interactions of IT technical personnel with business customers 51,90,97].
and users. ITSM is generally concerned with operational issues of Considering the dominant architectural component that provides the
information technology management and not with technology functionality to support decision-making, Power [81] differentiates
development. communication-driven DSS, data-driven DSS, document-driven DSS,
The growing importance for organizations to improve the manage- knowledge-driven DSS, and model-driven DSS. By definition, one or more
ment of their services has led to the emergence of international quantitative models are the dominant components of model-driven DSS
standards and frameworks such as ISO/IEC 20000 [43,44], ITIL [42] and [82]. This type of DSS emphasizes access to and manipulation of quantita-
CMMI-SVC [14], that provide process models and best practices for tive models, such us, algebraic, decision analytical, statistical, financial, op-
ITSM. ITIL (Information Technology Infrastructure Library), developed timization or simulation models to provide decision support. They are
by the Office of Government Commerce (OGC), is nowadays one of designed so that users can manipulate model parameters to analyze the
the reference models most used in organizations. The empirical works output sensitivity or to conduct a more ad hoc “what if?” analysis. More-
realized by Marrone and Kolbe [61,62] show the operational and strate- over, the model is accessible to a non-technical specialist, such as a man-
gic benefits that organizations gain with ITIL implementation. ager, through an easy user interface. Power and Sharda present in [81] an
Although ITSM frameworks provide important benefits, their imple- overview of model-driven research and show the applicability and useful-
mentation in real organizations is a complex process and for this it is ness of simulation-driven DSS to support business and engineering
decision-making. Simulation models are the main component of
⁎ Corresponding author.
simulation-driven DSS. The authors of [55,56,65,83,92] emphasize the im-
E-mail addresses: elena.orta@uca.es (E. Orta), mercedes.ruiz@uca.es (M. Ruiz), portance of using simulation model development methodologies to build
nuria.hurtado@uca.es (N. Hurtado), david.gawn@mail.uca.es (D. Gawn). valid and credible simulation models.

http://dx.doi.org/10.1016/j.dss.2014.06.002
0167-9236/© 2014 Elsevier B.V. All rights reserved.
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 37

The goal of this paper is to explore the application of simulation ITSM context. The intent is not to provide an exhaustive study but rather
modeling to support decision-making in the scope of ITSM. Its main to offer an overview of the use of these techniques in this field. We
contributions are as follows: address the following three research questions:

• A study of published research articles that apply simulation modeling • Q1: Is simulation modeling used to support decision-making in an
in an ITSM context. The simulation approaches used, the processes ITSM context?
modeled and the issues addressed in the selected articles have been • Q2: Are ITSM frameworks used in the analyzed research papers?
identified. • Q3: Are simulation model development methodologies used to build
• A decision-making framework to improve ITSM focused on simulation the models proposed?
modeling. Its main components are a specific methodology to develop The literature review undertaken follows three stages: 1) identifying
simulation models in this context and the simulation models built. the main issues addressed in the selected articles and associating these
• Two application cases of the proposed framework in the field of the works with the most related ITIL process, 2) classifying the articles ac-
ITIL capacity management and incident management processes. cording to the issues addressed, and 3) studying the articles to see if
The rest of this paper is structured as follows. The next section they propose the use of ITSM frameworks and standards or simulation
presents the results of the study we conducted of published research model development methodologies.
articles that apply simulation modeling in an ITSM context. Section 3 de-
scribes the decision-making framework proposed for ITSM improve- 2.1. Identifying the issues addressed and associating the articles with ITIL
ment. The two application cases of this framework are explained in processes
Sections 4 and 5. Finally, Section 6 contains our conclusions and
identifies further work to carry out in this area. This section presents an overview of published research articles that
describe an application case of simulation modeling in an ITSM context.
2. Simulation and IT service management: related work For each article found a study of the issues addressed has been per-
formed and it has been associated with the most relevant ITIL process.
The common goal of simulation models is to provide mechanisms for We have used ITIL since it is one of the ITSM frameworks most frequent-
experimentation, system behavior prediction, the resolution of ly adopted in organizations and provides important benefits [15,61,62].
questions such as “What would occur if …?”, and learning more In addition, ITIL recommends using simulation to support decision-
about the system represented. These models facilitate the experi- making in the continual improvement of processes [71].
mentation of different decisions and observing the results in systems ITIL structures service management processes in five modules
where the cost, time or risk of experimentation with the real system which correspond to the service lifecycle phases: Service Strategy
could be high [49]. They are usually built to understand how systems [74], Service Design [72], Service Transition [75], Service Operation
behave over time and to compare their performance under different [73] and Continual Service Improvement [71]. In the following para-
conditions. graphs, the articles found are referenced by process inside each of
A very useful simulation technique is sensitivity analysis. This tech- the service lifecycle phases. For each the issues addressed and the
nique allows one to study the effects on model outcomes of varying simulation approaches used are introduced. The simulation ap-
the values of model input parameters over a range of values. Thus, it proach names have been abbreviated as follows: discrete event sim-
helps managers determine the likely range of results when there are ulation (DES), system dynamics (SD), agent-based simulation (ABS),
uncertainties in the key input parameters, and identify which input Petri-net models (PNM), queuing models (QM), Monte Carlo simula-
parameters produce greater effects on model outcomes [49]. tion (MCS), probabilistic simulation (PS), and traditional mathemat-
There are a variety of simulation approaches, such as state-based ical simulation (MS). In some situations simulation is used to
process models, discrete event simulation, system dynamics, agent- validate conceptual or formal models. In this study we have intro-
based simulation, Petri-net models, queuing models, Monte Carlo simu- duced some works of this type and the simulation approach is
lation, probabilistic simulation, and traditional mathematical simulation named “other models simulation (OMS)”.
[81]. a) Service strategy module
This section explores the use of simulation modeling to support The purpose of service strategy is to design, develop and implement
decision-making in ITSM, looking specifically into the processes and is- service management as an organizational capability and as a strate-
sues modeled. Moreover, the use of both ITSM frameworks or standards, gic asset [74]. The articles found by process for this module are as
and methodologies to build simulation models in this field is also ana- follows:
lyzed. We think that this study is appropriate for the following reasons:
a.1) Strategy management for IT services process
• Simulation modeling is widely used to support decision-making in The goal of this process is to ensure that the service strategy is
different business areas and management tasks. An extensive variety defined and maintained, and achieves its purpose. This process
of practical questions can be addressed with simulation, such as stra- is responsible for defining the strategic goals and the appropri-
tegic management, planning, control and operational management, ate strategies for compliance [74]. Table 1 summarizes the pub-
process improvement and technology adoption [16,24,26,36,39,50, lications assigned to this process.
82,95,108]. a.2) Financial management for IT services process
• The growing global diffusion of ITSM frameworks and standards due The purpose of this process is to secure the appropriate level of
to the fact that organizations that implement them obtain important financing to design, develop and deliver services that meet the
benefits [15,61,62]. strategy of the organization [74]. The articles associated with
• The use of an adequate simulation model development methodology this process are shown in Table 2.
is one of the most influential aspects in the building process to obtain a.3) Demand management process
valid and credible models. This is fundamental since a well-designed The purpose of this process is to understand, anticipate and in-
model significantly improves the probability of a successful outcome fluence customer demand for services. This process works with
of a simulation study [55,56,65,83,92]. capacity management to ensure that the service provider has
enough capacity to meet this demand [74].
The study conducted focuses on a review of published research The system dynamics model that Orta et al. [77] propose in the
papers that describe an application case of simulation modeling in an context of capacity management allows one to study if the
38 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

Table 1
Simulation modeling in strategy management for IT service process.

Ref Approach Issues addressed

[47] SD Studying the interrelationships between the main elements of service management systems (business objectives, resources and processes).
[76] SD Analyzing strategic business rules and finding a good configuration for strategic business objectives and IT parameters.
[89] SD Exploring the role of SD research in making important progress with the following issue: “Why are some firms more profitable than others”
(the study can be applied in the field of strategy for IT services).
[27] SD Evaluating different business objective strategies and determining the most adequate.
[91] OMS Examining performance measures, defining an IT investment strategy and selecting the optimal scenario for business and IT governance alignment.

Table 2
Simulation modeling in financial management for IT service process.

Ref Approach Issues addressed

[31] SD Identifying situations in which the cost of improving services exceeds the benefits. For this, the models allow to study service behavior, resource allocation, customer
perception and reaction of competitors.
[99] QM Deciding the resource allocation that maximizes the benefits of service provider and minimizes the costs of service failures.
[1] MS, QM Analyzing the service cost based on penalties due to SLA violation and rewards received when the level targets are exceeded.
[57] DES Describing a framework for developing discrete-event simulation models which help estimate serviceability, costs, revenue, profit and quality of services.
[35] MS Analyzing the service cost considering alternative development teams and service providers, and determining the optimal cost service provider.
[80] DES Predicting the cost of services, analyzing the effects of business strategies, and defining both the IT infrastructure and the price of services.
[88] PS Analyzing the expected change-related costs.
[32] MS Discussing an analytical economic model of resource provision in a federated cloud. It also shows how to implement such federation among cloud providers for
better performance.
[63] MS Supporting cloud service selection across multiple sources considering cost and risk (they are factors relevant to the decision scope).
[66] MS Proposing an analytical model of hybrid cloud costs in which the costs of computing and data communication are taken into account.

service capacity contracted by customers is enough to satisfy delivery against the agreed service levels [72]. Table 3 presents
the service demand and meet the SLA. the articles assigned to this process.
b) Service design module The models proposed in some of the articles associated with
Service design can be defined as the design of appropriate and inno- other ITIL processes also help analyze issues related to service
vation IT services to meet current and future agreed business re- level management, such as: a) how to allocate resources to
quirements [72]. The articles found by process in this area are meet SLAs [3,99]; b) impacts of threats on SLAs [45]; c) implica-
referenced below: tions of an availability model in SLA management [28]; d) cost
b.1) Service catalog management process of services based on SLA compliance [1]; and e) effects of pro-
The objective of this process is to provide a consistent source of vider selection on SLA compliance [34].
information for all agreed services and ensure that it is available b.3) IT service continuity management process
[72]. The purpose of this process is to support the appropriate recov-
In [102], the authors introduce an IT service catalog model to ery capability within IT services to achieve the agreed business
manage services. They also propose a method to solve the prob- requirements [72]. The articles assigned to this process are
lem of service composition based on functions and levels of summarized in Table 4.
customer's requirements. The feasibility of the proposal is ver- b.4) Availability management process
ified and evaluated by simulation experiments (OMS simula- The aim of this process is to manage all IT service availability-
tion approach). related issues, ensuring that availability targets are achieved
b.2) Service level management process in a cost-effective and timely manner [72]. Table 5 presents
This process' aim is to negotiate for, agree on and document ap- the papers associated with this process.
propriate IT services. It also monitors and produces reports on b.5) Capacity management process

Table 3
Simulation modeling in service level management process.

Ref Approach Issues addressed

[96] ABS Examining a design-time assessment of an IT service architecture with respect to aspects of service level management.
[40] QM, DES Describing distributed transaction processing (DTP) systems which characterize the service industries, and comparing the predictive accuracy of different types of
queuing and discrete event models.
[104] MS Proposing an optimization model of response in SaaS in order to optimize business profit.
[30] MS, QM Presenting an SLA based business-driven adaptive quality of service maintenance mechanism for multi-tier service in a virtualized IT environment.

Table 4
Simulation modeling in IT service continuity management process.

Ref Approach Issues addressed

[100] DES Analyzing error impacts on IT services.


[101] OMS Presenting a model-driven framework that integrates business process modeling and IT management. It enables automatic consolidation of information from
multiple data sources and various stakeholders.
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 39

Table 5
Simulation modeling in availability management process.

Ref Approach Issues addressed

[85] PNM Improving service availability adding redundancy.


[28] MS Studying availability investment and discussing different availability strategies.
[60] OMS Assessing service risks focusing on two service availability metrics: a) the costs when the service is not available; and b) the probability that the service is available
(calculated using attack graphs). Additionally, a model of an intrusion detection system is proposed.

Table 6
Simulation modeling in capacity management process.

Ref Approach Issues addressed

[37] SD Studying the capacity requirements for BBC IT Storage Area Network to understand SAN capacity utilization trends and strategic acquisition planning decisions.
[1] MS, QM Presenting a dynamic capacity management framework based on an optimization model that links a cost model based on SLA contracts with an analytical queuing-
based performance model.
[57] DES Proposing a framework that helps to build models for evaluating effectiveness of different resource management policies. The models also simulate interactions of
demand planning activities for service engagements, human resource supply planning, resource attrition and termination, and execution of service orders to
estimate business performance.
[76] SD Analyzing the consequences of under or over estimation of an outsourced service capacity on the application performance.
[70] MS Proposing algorithms of dynamic QoS optimization and adaptation of inter-dependent task sets in cooperative embedded systems.
[40] QM, DES Describing distributed transaction processing systems which characterize the service industries, and comparing the predictive accuracy of different types of queuing
and discrete event models.
[2] QM Introducing a web service capacity planning methodology based on a workload model and a service behavior queuing model.
[79] QM Predicting the performance of composite web services with limited resources.
[99] QM Studying methods to provision an e-commerce service provider's application-tier servers among a set of customer companies to maximize the provider's profit.
[84] MS Presenting an energy-aware online provisioning approach based on simulations for high-performance computing applications on consolidated and virtualized
computing platforms.
[54] MS Describing an enhanced Network Control Plane architecture operating over a virtual optical infrastructure to provide IT-aware and energy-efficient connectivity
services between data centers.
[38] MS Introducing a new approach to perform dynamic resources management in virtualized data centers that proposes considering the non-stationary noise of the VMs'
demand behavior.
[33] MS Introducing an algorithm for provisioning complex IT applications over optical networks and a discrete event simulator for cloud environments with under light-
trail network.
[52] MS Examining two approaches and three types of metrics for quantifying the performance isolation on cloud-based systems.

The goal of this process is to ensure a cost-justifiable IT capacity transition activities [75]. The articles associated with this pro-
matched to the agreed business requirements [72]. The papers cess are shown in Table 8.
assigned to this process are shown in Table 6. c.2) Change management process
b.6) IT security management process The objective of this process is to ensure that standardized
The aim of this process is to align IT security with business se- methods are used for the efficient and prompt handling of all
curity and ensure that the confidentiality, integrity and avail- changes [75]. Table 9 summarizes the papers associated with
ability of the organization's assets, information, data and IT this process.
services always match the agreed business needs [72]. Table 7 d) Service operation module
introduces the articles assigned to this process. The purpose of service operation is to deliver services to agreed
c) Service transition module levels and to manage the applications, technology and infrastructure
The role of service transition is to deliver services that are required that support service delivery [73]. The processes for this module are
by the business into operational use [75]. The following processes as follows:
are grouped in this module: d.1) Incident management process
c.1) Transition planning & support process The objective of this process is to manage and restore nor-
The goals of this process are to plan and coordinate resources, mal service operation after an interruption as rapidly as
and to manage the risks of failure and disruption across the possible and with minimal impact on the business [73].

Table 7
Simulation modeling in IT security management process.

Ref Approach Issues

[86] SD Determining the optimal values of security management parameters and their interrelationships.
[60] OMS Studying network, attack and intrusion detection systems that can be applied in simulation experiments for networks with SOA architecture.
[64] SD Examining a theory of the development of insider-threat risks.
[68] SD Integrating change and access controls into their business process in the way that most effectively reduces security risk.
[69]
[29] OMS Estimating the improvements of the quality of CVSS-based (Common Vulnerability Scoring Systems) vulnerability prioritization.
[93] MCS Determining how the employees' use of social networks impacts their organization, and identifying how to mitigate potential risks.
[45] OMS Introducing a formal approach towards risk-aware service level analysis and planning.
[67] MCS Analyzing and handling security events/alerts and managing and remediating security incidents.
[63] MS Evaluating cloud service selection across multiple sources considering, mainly, cost and risk factors.
[105] MS Examining the protection of client privacy from malicious service providers and different noise generation strategies.
[106]
[107]
40 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

Table 8
Simulation modeling in transition planning & support process.

Ref Approach Issues

[19] SD Analyzing the interrelationships between specific KPIs and studying how planned behavior may lead to unintended outcomes.
[34] OMS Selecting the optimal cost service provider considering the process progress and service availability.

Table 9
Simulation modeling in change management process.

Ref Approach Issues addressed

[68] SD Defining a process for integrating change and access controls into organization business processes.
[59] QM Selecting the optimal cost service provider considering both the process progress and the service availability.
[18] OMS Discovering change templates from historic traces recorded in provisioning systems. The change logs were generated by simulation of different RFC execution.
[87] PS Analyzing the business impact of changes in a network of services. Decision models to schedule service changes in a way to reduce total expected change-related
costs have been developed.
[103] OMS Presenting a patch management framework based on SLA-driven patch applicability analysis that is better than the traditional ones.

Table 10 summarizes the articles associated with this pro- indicate that these techniques are widely used in this field. Most of
cess. the analyzed works use them in the scope of the following ITIL pro-
d.2) Request fulfillment process cesses: strategy management for IT services, financial management
The aim of this process is to enable users to request ser- for IT services, service level management, availability manage-
vices, and to source and deliver the services [73]. The pa- ment, capacity management, security management, change man-
pers associated with this process are shown in Table 11. agement, incident management and request fulfillment. These
d.3) Access management process works focus mainly on the study of service management strategies,
The aim of this process is to provide the rights for users to process key performance indicators, service cost, service level ob-
be able to access services and prevent access to non- jectives and process configuration. Additionally, the simulation ap-
authorized users [73]. proaches most frequently used are system dynamics, discrete
event simulation, queuing models and traditional mathematical
The authors of [5] use simulation modeling to support decision pol- simulation.
icies in identity and access management (OMS). The authors focus on The second and third research questions asked for the use
the provisioning process of user accounts on enterprise applications of both ITSM frameworks and simulation model development
and services. methodologies. Though several works highlight their
importance, evidences of a systematic use of them have not
2.2. Classifying the referenced articles according to issues addressed been found.

The results presented above identify the main issues addressed in 3. Decision-making framework for improving IT service management
the referenced articles. These issues can be grouped into the five catego-
ries presented in Table 12. The research article analysis conducted in the previous section
shows that simulation modeling is extensively used to support
2.3. Studying the use of ITSM frameworks and simulation model decision-making in the field of several ITSM processes. Though
development methodologies these papers address many issues and are suitable to solve particular
problems, there is no evidence of a systematic use of ITSM frame-
There isn't any evidence of the use of both ITSM frameworks and works and methodologies in the building process of the simulation
specific simulation model development methodologies in the papers models proposed. As a consequence, and given their importance to
analyzed. build credible simulation models that help to solve real-world orga-
nization problems, we consider it important to undertake a research
2.4. Study results effort in this field.
Fig. 1 shows Simulation for ITSM (Sim4ITSM), a novel framework to
The first research question asked whether simulation modeling support decision-making to improve ITSM focused on simulation
is used to support decision-making in an ITSM context. The findings modeling. Its main components are a specific methodology to build

Table 10
Simulation modeling in incident management process.

Ref Approach Issues addressed

[46] SD Assessing performance metrics of incident management and problem management processes.
[58] MS Analyzing the effects of the differences between support groups.
[53] DES Optimizing the number of Help Desk operators and their working time.
[7] QM Evaluating different support group reorganization strategies.
[11] DES Studying the effects of support group configuration on SLAs compliance.
[8] QM Estimating the cost of implementing different incident management strategies and analyzing the alignment of these strategies with the business objectives.
[9] DES Examining the dynamics of both the organization and the support groups.
[10] DES Introducing a web application developed using a Software-as-a-Service focus and a tiered architecture.
[25] MS Identifying key performance indicators of the incident management process.
[20] MS Demonstrating that the ticket allocation problem is an instance of the online scheduling problem on unrelated machines, and presenting auction based models for
solving it.
[13] OMS Proposing an improved management process for cloud computing environments based on BDIM, and describing details about incident predication and prioritization
algorithms.
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 41

Table 11
Simulation modeling in request fulfillment process.

Ref Approach Issues addressed

[78] MS Studying alternative dynamic assignment policies in an IT service delivery environment. A heuristic algorithm that assigns and describes the allocation index to each
service request received is presented.
[21] MS, DES Providing recommended staffing levels in a complex service delivery system.
[22] DES Determining minimum staffing requirements while meeting contractual service quality commitments in a global service delivery system.

Table 12
ITSM issues categories addressed.

Issue category Issue category description and referenced articles

Service management strategies Designing and examining service management strategies to improve the process performance, results and behavior.
[2,7–10,13,20,27–29,33,34,37,38,54,57,58,63,64,67–70,76–78,80,84,85,89,91,93,99,102,105–107].
Key performance indicators (KPIs) Defining and evaluating process performance metrics.
[1,2,8,13,19,20,25,30,32,40,46,52,60,67–69,76,79,91,93,100,101].
Service cost Analyzing service cost and designing management strategies to reduce service cost and obtain more benefits.
[1,31,32,35,57,60,63,66,80,87,88,99].
Service level objectives (SLOs) Determining optimal service level objectives and evaluating its compliance.
[1,3,11,28,34,35,40,45,77,91,96,99,103,104].
Process configuration Examining different process configurations and identifying optimal values of the process configuration parameters.
[7,11,18,21,22,47,53,59,86].

simulation models in this context (SimMet), the simulation models built to the particular characteristics that these models present. Fig. 2
and model experimentation (model simulation and simulation optimi- summarizes its main activities (A) and tasks (T): a) objective, b)
zation). SimMet allows us to systematically build correct and consistent inputs, c) outputs (O), and d) roles that perform it (SM: Service
simulation models [6,94] to address the issues identified in the Manager; M: Modeler). In addition, it indicates the activities that
literature review considering both ITIL recommendations and or- use ITIL process recommendations and organization process infor-
ganization information. This methodology is the result of adapting mation a) process description, b) management strategies and tech-
other simulation model development methodologies [56,65,83,92] niques, c) KPIs and d) SLOs.

Fig. 1. Decision-making framework for improving ITSM (Sim4ITSM).


42 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

In the above section, the main issues that are usually addressed output variables represent the process output variables (KPIs, results,
through simulation modeling are identified and presented in Table 12. behavior and cost) and the degree of SLOs compliance; and c) conceptu-
In order to build simulation models that allow us to study these issues, al model represents the behavior of both the process and service man-
SimMet proposes to model them as indicated in Fig. 2: a) model input pa- agement strategies.
rameters represent the process SLOs and the configuration parameters Once the simulation models have been built, managers can per-
of both the process and the service management strategies; b) model form model simulations manipulating the input parameter values

Fig. 2. SimMet activities and tasks.


E. Orta et al. / Decision Support Systems 66 (2014) 36–51 43

Fig. 2 (continued).

Table 13
SLA parameters (capacity management process).

Parameter type Parameters

Service capacity • Contracted validation rate: credit validation service capacity contracted by the company.
Service response times (SLOs) • Expected response time (ERT): maximum service response time above which the provider is penalized.
• Maximum response time (MRT): maximum service response time above which the validation request is abandoned.
Service performance (SLOs) • Validated request rate: minimum percentage of service requests that must be validated within the ERT.
• Abandoned request rate: maximum percentage of service requests that are permitted to be abandoned.
Penalties • Maximum response time penalty: penalty for each service request validated above the expected response time.
• Abandonment penalty: penalty for each service request abandoned.

Table 14
Model input parameters (capacity management process).

Category Input parameter

Client configuration • Received request rate: trend of the received service requests.
• SLA parameters (see Table 13).
Service capacity configuration • Card validation rate (CVR): validation service capacity that the provider assigns to the company.
• CVR percentage: percentage of the CVR used to validate the service requests within the ERT. The remaining capacity is used to validate
the service requests that awaiting answers within the MRT.
• Strategy selection: service capacity management strategy used by the service provider.

through the user interface. Model simulations provide informa- experimentation provides information that helps managers to
tion that enable managers to analyze the process outputs by vary- make better decisions to improve processes and meet the busi-
ing the configuration of both the process and the management ness objectives.
strategies. Thus, managers can identify the configuration param- The next sections present two application cases in the con-
eters that produce the most effects on process outputs, and deter- text of the ITIL capacity management and incident management
mine the configuration that meets the SLOs defined in the processes. Not all the activities and tasks performed to build
organization. Additionally, optimization experiment results the simulation models are described, only the most relevant
allow managers to determine the process configuration that ones are summarized to demonstrate the usefulness and applica-
meets the optimization objective established. Thus, model bility of the framework.

Table 15
Model output variables (capacity management process).

Category Output variable

Service behavior • Requests received: number of service requests received.


• Requests validated ERT: number of service requests validated within ERT.
• Requests validated MRT: number of service requests validated within MRT.
• Requests abandoned: number of service requests abandoned because MRT is exceeded.
Service performance • Non-compliance ERT: deviation between the value of the SLA parameter Validated request rate and the rate of service requests validated within ERT.
• Abandonment non compliance: deviation between the rate of service requests abandoned and the value of the SLA parameter Abandoned Request Rate.
• Response time penalty: penalization for non-compliance with agreed response times.
44 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

Fig. 5. Validated requests MRT (Strategy A).


Fig. 3. Validated requests ERT (Strategy A).

4. Capacity management process simulation model a) Strategy A: the service provider decides the service capacity per-
centages that will be used to validate the received service requests
4.1. Activity A1. Define organization process within the ERT and MRT, respectively. These percentages are con-
stant and do not change over time.
4.1.1. Task T1.1. Learn process b) Strategy B: initially, the service provider establishes the service ca-
The purpose of the ITIL capacity management process is to provide pacity percentages that will be used to validate the service re-
the necessary capacity and to offer good quality IT services at a reason- quests within the agreed response times. However, the service
able cost. This process comprises three sub-processes [72]: a) Business capacity assigned to validate service requests within the MRT
Capacity Management, b) Service Capacity Management, and c) Compo- that is not necessary to use because there are no service requests
nent Capacity Management. This paper focuses on the Service Capacity awaiting response, will be assigned to validate the new service re-
Management sub-process. The main aim of this sub-process is to man- quests received within the ERT. Therefore, the service capacity per-
age the service capacity in order to comply with the SLAs that the pro- centages depend on the received service request rate.
viders sign with their clients. In this context, service providers can
implement different service capacity management strategies which
have different effects on the service performance and the degree of 4.3. Activity A5. Select the simulation paradigm
SLA compliance.
The simulation paradigm chosen for building the simulation model
is system dynamics.
4.2. Activity A4. Describe the problem
4.4. Activity A6. Model conceptualization
For the model construction, a banking validation service provider
and an e-commerce company that sells their products through its web 4.4.1. Task T6.1. Define the model context and purpose
portal have been considered. The banking validation service provider The simulation model has been built in the scope of the ITIL service
provides the company a credit validation service that validates credit capacity management sub-process [72]. Its purpose is to help service
card details, and verifies that the company's customers possess enough providers to make decisions to properly manage service capacities
credit to realize the purchase. The conditions under which the service assigned to their clients, and ensure compliance with SLAs. Additionally,
must be provided are documented in the SLA signed with the company. the model allows the study of penalties to be assumed by the provider
for non-compliance with the agreed response times (ERT and MRT).
• SLA parameters
The SLA parameters are classified and described in Table 13 [72]: 4.4.2. Task T6.2. Define model input parameters
• Service capacity management strategies The model input parameters are classified and described as Table 14
The service capacity management strategies determine the manner in shows.
which the service provider assigns the service capacity to perform the
received credit validation service requests within the agreed response
4.4.3. Task T6.3. Define model output variables
times (ERT and MRT). The following strategies are considered in the
The main output variables can be classified and described as Table 15
case study:
summarizes.

Fig. 4. Validated requests ERT (Strategy B). Fig. 6. Validated requests MRT (Strategy B).
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 45

Table 16
SLA parameters (incident management process).

Parameter Description

MaxResTime Maximum incident resolution time.


IncReqMaxResTime Minimum percentage of incidents that must
be solved within the MaxResTime.
Penalization Penalty for not meeting the parameter IncReqMaxResTime.

having the same number of service requests abandoned and these


Fig. 7. Abandoned requests (Strategy A). begin to be abandoned at the same time.
• Experiment 2. The aim of this sensitivity analysis is to determine the
values of the service capacity management parameters that ensure
4.5. Activity A8. Implement the model
SLA compliance. The results obtained indicate the following: a) the
valid service capacity values are the same with both strategies
The implementation and simulations of the model have been per-
(CVR N = 4239 requests/minutes); and b) the valid service capacity
formed using the Vensim DSS® V.4.0 simulation tool [98].
percentage values vary depending on both the service capacity
assigned to the company and the capacity management strategy
4.6. Model experimentation
adopted. So for example, with the service capacity contracted by the
company considered in the case study (4.395 requests/minutes),
To show the usefulness of the simulation model, this section de-
SLAs are met with the following capacity management parameter
scribes some sensitivity analysis experiments conducted to analyze
values: a) Strategy A: CVR percentage N = 96%; and b) Strategy B:
the behavior and performance of the credit validation service. They
CVR percentage N =0%.
also enable the study of the penalization for non-compliance with the
• Experiment 3. This sensitivity analysis allows one to determine the
SLA response time parameters. These experiments have been per-
lowest service capacity and the service capacity percentage values
formed varying the values of the service capacity configuration param-
that ensure SLA compliance. In the case study, with both strategies
eters (model input parameters): a) service capacity assigned to the
the same results are obtained: a) the lowest valid service capacity is
company; b) service capacity percentages assigned to validate the re-
4.239 requests/minute; and b) CVR percentage N =95%. Moreover, in
ceived service requests within the agreed response times (ERT and
the scenarios where SLAs are not met, it is observed that the degree
MRT); and c) service capacity management strategies (strategies A or
of non-compliance is higher with Strategy A than with Strategy B.
B). The analysis of the simulation results helps the service provider to
Besides, with Strategy A the SLAs are not met for longer than with
decide the values of the service capacity configuration parameters that
Strategy B.
improve the service behavior and meets the SLA. To illustrate these
ideas the following paragraphs summarize some of the experiments All these experiments also allow one to study the penalization that
performed. would have to be assumed by the provider for non-compliance with
the agreed response times. For example, the results obtained in Experi-
• Experiment 1. The purpose of the sensitivity analysis performed in this ment 1 show that the lowest penalization is obtained with Strategy B
experiment is to study the service behavior with the service capacity and CVR percentage ≤ 91%. Moreover, considering the smallest valid
contracted by the company considered in the study case (4.395 re- service capacity obtained in Experiment 2 (4.239 requests/minute), the
quests/minute), and varying the service capacity strategy and the ser- lowest penalization is obtained with Strategy B and varying in time
vice capacity percentages. The results obtained show that the service the value of CVR percentage. Initially, the optimal value of this percent-
behavior is as follows: a) the trend of the service requests validated age is 96%, but from a certain point in time (6.25 min) to the end of
within the expected response time (ERT) is very similar with both the simulation, this value changes to 100%. It is observed that the
strategies, but with Strategy A more service requests are validated dynamic character of the model helps to decide when to change the
than with Strategy B (Figs. 3 and 4); b) with Strategy A more services CVR percentage value to ensure that the penalization is as low as possible
requests are validated within the maximum response time (MRT) during all of the simulation period.
than with Strategy B, and these begin to be validated before (Figs. 5
and 6); c) with Strategy B fewer service requests are abandoned 5. Incident management process simulation model
than with Strategy A, and these are abandoned later (Figs. 7 and 8);
and d) if all the service capacity is used to validate the service requests 5.1. Activity A1. Define organization process
within the ERT (CVR percentage is equal to 100%), with both strategies
5.1.1. Task T1.1 Learn process
The main aim of the ITIL incident management process is to manage
and restore the normal service operation after an interruption as rapidly
as possible, and with minimal impact on the business [73]. An incident is
an unplanned interruption to an IT service or a reduction in the IT
service quality [41].
IT support organizations usually consist of a network of support
groups structured in several levels (typically 3 to 5). The support groups
at lower levels perform generic tasks, while higher level groups perform
more technical and specific tasks. The technicians of the different sup-
port groups are specialized in certain incident categories (e.g., PC, server
or network).
The incident management process begins when a client detects an
Fig. 8. Abandoned requests (Strategy B). incident and reports the service interruption to the organization. After,
46 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

Table 17
Model input parameters (incident management process).

Category Input parameter

Client configuration • ClientQuotai: monthly quota for clients of the category i.


• IncReqRate: received incident trend.
• IncReqClosed: estimation of the incident percentage solved satisfactorily and closed.
• SLA parameters (see Table 16).
Support group configuration For each support group i the following parameters are defined:
• SGNumberi: number of operators.
• SGShifti: active shift.
• Specializationi: incident category in which the support group is specialized.
• MinTimeij, MedTimeij, MaxTimeij: estimations of the completion times of each process activity j.
• Efficiencyi: estimation of the percentage of incidents that the support group can solve without escalating the incidents.
Incident management strategy configuration • Parameters that allow the definition of the incident management strategies that the model simulates (a) SeverityStrategies
(2), b) PriorityStrategies (2), c) AllocationStrategies (4), and d) Escalation Times (2))
• Parameters that allow the selection of the strategies that will be used in process simulations (SeverityStrategySel,
PriorityStrategySel, Level1AllocStrategySel, Level2AllocStrategySel).

the incident is assigned to one of the idle analysts of the first level sup- Management process [73]; and b) information obtained from real
port, who records and classifies the incident. The analyst also realizes an IT support organizations [7,9].
initial incident analysis to determine its severity and resolution priority.
Depending on the incident category, severity and priority, the responsi- • SLA parameters
ble assigned to resolve the incident could be: a) the analyst who realizes The SLA parameters considered in this study are shown in Table 16
the initial analysis; or b) a technician of a support group specialized in [73]. The values of these parameters are different for each client cate-
the incident category. If the responsible assigned cannot solve the inci- gory and incident priority. The most restrictive values correspond to
dent, it is escalated to a higher level support group. It is also possible that higher priority incidents of Gold clients.
technicians of different support groups perform tasks that contribute to • IT support organization structure
solve the incident. Thus, the incident may go through different stages
The IT support organization is structured in the following support
and be treated by several support groups. Finally, the incident is closed levels: a) Support Level 0 or Service Desk (composed of six support
if the client confirms that it has been resolved satisfactorily. Otherwise,
groups: three groups of Analysts and three groups of Operators); b)
the incident is reallocated again to a support group. Support Level 1 (comprised of ten support groups: GS1–GS10); and
The incident management process has objectives that are specific to
c) Support Level 2 (composed of five support groups: GS11–GS15).
the organization (SLOs), and are specified in the SLA that the organiza- Each support group is specialized in a concrete incident category
tion and its clients sign. Many factors influence the process outcomes
and is active during one of the work shifts established in the organiza-
and the SLA fulfillment, such as the following: a) the organization struc- tion (first shift, second shift and third shift).
ture; b) the received incident trend; c) the configuration and efficiency
• Incident management strategies
of the support groups; d) the time required to perform the process ac- The organization applies the following incident management
tivities; and e) the incident management strategies implemented in
strategies:
the organization. Therefore, the IT support organizations have to decide
how to organize their internal structure and which incident manage-
ment strategies should be adopted to achieve their SLA targets. a) Incident severity strategies. These strategies determine the incident
severity based on the incident urgency and impact on the organi-
zation.
5.2. Activity A4. Describe the problem b) Incident priority strategies. These strategies determine the incident
resolution priority according to the client category and the inci-
For the model construction, an IT support organization that has two dent severity.
client categories (Gold and Non-Gold) is considered. The objectives of c) Support group allocation strategies. These strategies determine the
the incident management process are specified in the SLA that the orga- support group to which the incident is allocated according to the
nization agrees with its clients (Gold clients' SLA and Non-Gold clients' following support group information: operator availability, work-
SLA). load, specialization and average incident resolution time.
The SLA parameters, the internal structure of the organization d) Incident scaling strategies. These strategies determine the support
and the incident management strategies considered in the case group level to which the incident is allocated if either of the follow-
study are defined using the following information as reference: a) ing occurs: a) the responsible assigned is unable to solve the inci-
the description and recommendations of ITIL Incident dent; or b) the maximum waiting time established to solve the
incident is exceeded. These strategies also determine the support
group allocation strategy that will be applied if the incident is
Table 18
Model output variables (incident management process).
scaled.

Category Output variable The model allows one to simulate two incident severity strategies,
Process behavior • IncReqRec: incidents received. two incident priority strategies, four support group allocation strategies
• IncReqSol: incidents resolved. and one scaling strategy.
Process results • IncReqSolMRT: incidents resolved within the agreed time
limits.
• Penalization: penalty for not meeting SLA targets.
Process performance For each support group i the following indicators are obtained: 5.3. Activity A5. Select the simulation paradigm
• SGQueueSizei: queue size.
• SGIdleAgenti: number of idle operators. The simulation paradigm chosen for model building is discrete event
• SGUtilizationi: average use.
simulation [73].
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 47

Fig. 9. Resolved incidents grouped by client category and priority.

5.4. Activity A6. Model conceptualization 5.6. Model experimentation

5.4.1. Task A6.1. Define model context and purpose The objectives of the model experiments described in this section
The model enables the prediction of process behavior, results and are as follows: a) analyzing the process results with an initial process
performance considering alternative process configurations. Addition- configuration; and b) examining what changes can be made in the ini-
ally, the model allows the determination of the process configuration tial process configuration to improve the process results. Following
that optimizes the results and meets SLA targets. The organization will these three experiments, two optimization experiments are also
comply with the SLA (Table 16) if the percentage of incidents solved presented.
within the maximum resolution time (specified in the parameter
• Experiment 1. The purpose of this experiment is to study the process
MaxResTime) is greater than or equal to the value of the parameter
behavior, results and performance with the initial process configura-
IncReqMaxResTime. Additionally, the model allows the analysis of the
tion considered in the case study. The results obtained show the fol-
penalty for non-compliance to the SLA.
lowing process behavior: a) the process solves about 89% of the
incidents of priority 1, 2 and 4; but only about 57% of the incidents of
5.4.2. Task A6.2. Define model input parameters priority 3; b) 8.73% of the Gold clients' incidents and 85.61% of the
Given the large number of the model input parameters, they are Non-Gold clients' incidents are resolved within the agreed
summarized and clustered into the categories shown in Table 17: maximum resolution times (average percentage is equal to 59.98%);
and c) 83.3% of the total penalty that the organization will have to
assume is due to not meeting the Gold clients' SLA (16.7% is due to
5.4.3. Task A6.3. Define model output variables non-compliance with the Non-Gold clients' SLA). This data can also
The main output variables are summarized and grouped in Table 18. be studied at other levels of aggregation, such as client category and in-
The model calculates the total values for the process behavior and the cident priority. So for example, Fig. 9 presents the resolved incident
result indicators, and aggregates them by different criteria (client, client percentage (at a given time during the simulation) grouped by client
category, incident priority, and client category & incident priority). category and incident priority. It shows that the most resolved
incidents are the Gold clients' incidents of priority 4 (47.6%) and the
Non-Gold clients' incidents of priority 4 (40%). Moreover, the least
5.5. Activity A8. Implement the model resolved incidents are the Gold clients' incidents of priority 3 (10%)
and the Non-Gold clients' incidents of priority 1 (0%).
The implementation and experimentation of the model have been In addition, the process performance has been analyzed in terms
performed using the multiparadigm simulation tool AnyLogicTM [4]. of the sizes, number of busy operators and average use of the

Fig. 10. Average use of Level 1 support groups.


48 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

Table 19
Issues addressed through capacity management and incident management.

Issues addressed Simulation models

Capacity management Incident management

Service management strategies


Designing and examining service management strategies to improve the process performance, results and behavior. X X

Key performance indicators


Defining and evaluating process performance metrics. X X

Service cost
Analyzing service cost and designing management strategies to reduce service cost and obtain more benefits. X X

Service level objectives


Determining optimal service level objectives and evaluating its compliance. X X

Process configuration
Examining different process configurations and identifying optimal values of the process configuration parameters. X

support groups. It is observed that while some support groups configuration obtained in the scenario simulated, the maximum per-
(e.g. GS1 and GS2) have a high average use and incidents in its centage of incidents that can be resolved within the agreed times is
queues, and all its operators are busy; others (e.g. GS3 and GS4) equal to 83.07 %.
have lower average use, idle operators and no pending incidents. • Optimization Experiment 2. The purpose of this experiment is to deter-
Fig. 10 shows the average use of Level 1 support groups at a given mine the process configuration that meets a concrete optimization
time during the simulation. objective, and minimizes the deviation between the following data:
The results of this experiment show that the initial process con- a) the minimum percentage of incidents that must be resolved within
figuration considered in the case study is inadequate because the agreed times (value of the SLAs parameter IncReqMaxResTime);
27% of the incidents are not resolved satisfactorily, the degree and b) the percentage of incidents that the process resolves within
of non-compliance with Gold clients' SLA is very high (91.2 %), the agreed times. The optimization objective in the simulated scenario
and the support groups' performance is bad and could be im- is the following: “The percentage of incidents resolved within the res-
proved. To decide what changes to realize in the initial process olution times agreed in the SLAs must be greater or equal to 95% of the
configuration to improve the process results, Experiments 2 and incidents received”. The optimal process configuration that meets the
3 have been performed. optimization objective enables the resolution of 97.58% of the inci-
• Experiment 2. This sensitivity analysis has been configured varying dents received within the SLA time targets.
the values of the following model input parameters: a) Service
Desk configuration; b) incident severity strategy selected; and c) 6. Conclusions and further work
incident priority strategy selected. Simulation results indicate
that the best results are obtained with the following process con- This paper focuses on the application of simulation modeling to sup-
figuration: a) 4 analysts and 1 operator in the support groups ac- port decision-making in the scope of ITSM. A study of published re-
tive in the first or second shift; b) incident severity strategy search articles that propose simulation models in this context has
number two; and c) incident priority strategy number two. With been presented. It shows that different simulation approaches have
this process configuration, the percentage of incidents resolved been used to address many issues in the context of several processes.
within the agreed time limits is equal to 81.12%. This percentage These issues can be grouped and classified as follows: defining appro-
is 21.15% higher than the percentage obtained with the initial pro- priate service management strategies, analyzing process key perfor-
cess configuration (59.98%). Therefore, the model is highly sensi- mance indicators, studying and improving service cost, evaluating
tive to changes in the configuration of the Service Desk, and the service level objective compliance and determining optimal process
incident severity and priority strategies. configuration.
• Experiment 3. Another sensitivity analysis has been configured However, in these works there is no evidence of a systematic use of
varying the values of the incident scaling strategy configuration both ITSM frameworks and simulation model development methodolo-
parameters. Simulation results show that the range of values ob- gies. As a consequence, and given their importance to build valid simula-
tained for the output variable that measures the average percent- tion models, this paper proposes a novel decision-making framework for
age of incidents resolved within the agreed times, is between 80% improving ITSM based on simulation modeling (Sim4ITSM). The main
and 82.3%. The optimum value of this variable (82.3%) is only 1.18 component of Sim4ITSM is a simulation model development methodolo-
% higher than the value obtained with the initial process configu- gy (SimMet) that helps to systematically build simulation models apply-
ration (81.12%). Therefore, the model is only slightly sensitive to ing ITIL recommendations to address the issues identified in the study of
changes in the configuration of the incident scaling strategy. research articles conducted. The model simulations provide information
about the model purpose and allow managers to experiment with differ-
Finally, two optimization experiments performed using the
ent decisions, varying the model input parameter values via the user in-
metaheuristic techniques of the AnyLogicTM optimization engine
terface. Thus, the analysis of the model experimentation results
OptQuest are presented.
helps managers to know the effects of changes before their imple-
• Optimization Experiment 1. This experiment allows the determination mentation in the organization and to make better decisions.
of the support group configuration and the values of the scaling pa- To illustrate the usefulness and applicability of the framework
rameters that maximize the percentage of incidents that the process proposed, two application cases in the context of the ITIL capacity man-
can resolve without exceeding the time limits established in SLAs. In agement and incident management processes have been introduced.
this experiment, restrictions to limit the maximum values of the per- The purpose of the capacity management model is to help the service
sonnel configuration parameters have been set. In the optimal process provider decide what service capacity management strategy to adopt
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 49

to improve the service response times and ensure service level objective [17] S.W. Choua, C.H. Chiangb, Understanding the formation of software-as-a-service
(SaaS) satisfaction from the perspective of service quality, Decision Support
compliance. Further, the incident management process model allows Systems 56 (2013) 148–155.
managers to examine the process results with alternative process con- [18] W. Cordeiro, G. Machado, F. Andreis, J. Wickboldt, R. Lunardi, R.A. dos Santos,
figurations, and determine the process configuration that optimizes CHANGEMINER: a solution for discovering IT change templates from past execu-
tion traces, Proceedings of the IFIP/IEEE International Symposium on Integrated
the results and meets the SLOs. Table 19 summarizes the issues from Network Management, 2009, pp. 97–104.
Table 12 that can be addressed through experimentation with these [19] W. Currie, P. Joyce, P.G. Winch, Evaluating application service provisioning
models. using system dynamics methodology, British Journal of Management 18
(2006) 172–191.
Finally, the main objectives of further work in this area are as [20] H. Demirkan, D. Delen, Leveraging the capabilities of service-oriented decision sup-
follows: port systems: putting analytics and big data in cloud, Decision Support Systems 55
(1) (2013) 412–421.
[21] P. Deshpande, D. Garg, N. Rama Suri, Auction based models for ticket allocation
• Extend the functionality of the simulation models presented in
problem in IT service delivery industry, Proceedings of the IEEE International Con-
this work to solve more complex problems (different simulation ference on Services, Computing, 2008, pp. 111–118.
approaches can be applied). [22] Y. Diao, A. Heching, Staffing optimization in complex service delivery systems, Pro-
• Build simulation models in the context of other ITSM process- ceedings of the 7th International Conference on Network and Service Manage-
ment, 2011, pp. 1–9.
es. [23] Y. Diao, D. Nurthcutt, Modeling a complex global service delivery system, Proceedings
• Apply multi-objective optimization techniques to optimize simu- of the Winter Simulation Conference, 2011, pp. 690–702.
lation outputs. [24] N.D. Domenica, G. Mitra, P. Valente, G. Birbilis, Stochastic programming and
scenario generation within a simulation framework: an information systems
• Integrate the models developed in a tool based on multiparadigm perspective, Decision Support Systems 42 (2007) 2187–2218.
simulation that is currently under development (this tool will allow [25] D. Donko, I. Traljic, Performance estimation of organizational activity, Proceedings
the simulation of interrelated ITSM processes within a common of the 2nd IEEE International Conference on Computer Science and Information
Technology, 2009, pp. 284–288.
framework). [26] S. Feng, X.L. Ling, Z.G. Duan, J.L. Zhang, Assessing the impacts of south-to-north
water transfer project with decision support systems, Decision Support Systems
42 (2007) 1989–2003.
[27] A. Folgueras, F.J. Sáenz, M. de la Cámara Delgado, Técnicas de modelado de los
Acknowledgments
costes variables aplicados al proceso de planificación estratégica con filosofía
ciclo de vida de servicios TI, III Congreso Internacional itSMF España, Universidad
This work has been partially supported by the Spanish Ministry of Carlos III de Madrid, Madrid, 2008, (C. Fruhwirth, T. Mannisto, Improving CVSS-
based vulnerability prioritization and response with context information, in: Pro-
Science and Technology with ERDF funds under grants TIN2010-
ceedings of the 3rd International Symposium on Empirical Software Engineering
20057-C03-03, and TIN2013-46928-C3-2-R. and Measurement, 2009, pp. 535–544).
[28] U. Franke, Optimal IT service availability: shorter outages, or fewer?
IEEE Transactions on Network and Service Management 9 (1) (2012)
References 22–33.
[29] C. Fruhwirth, T. Mannisto, Improving CVSS-based vulnerability prioritization
[1] B. Abrahao, V. Almeida, J. Almeida, A. Zhang, D. Beyer, F. Safai, Self-adaptive and response with context information, Proceedings of the 3rd International
SLA-driven capacity management for internet services, 10th IEEE/IFIP Network Symposium on Empirical Software Engineering and Measurement, 2009,
Operations and Management Symposium, 2006. 557–568. pp. 535–544.
[2] V. Almeida, Capacity planning for web services, Techniques and Methodology, [30] F. Gao, X. Qiu, L. Meng, SLA based business-driven adaptive QoS maintenance
LNCS 2459, Performance Evaluation of Complex Systems: Techniques and Tools, mechanism for multi-tier service in virtualized IT environment, Proceedings of
Performance, Tutorial Lectures2002. 142–157. the International Workshop on Management of Emerging Networks and Services,
[3] L. An, J. Jeng, Web services management using system dynamics, Proceedings of 2010, pp. 627–631.
the IEEE International Conference on Web Services, 2005, pp. 347–354. [31] H. Gebauer, A dynamic theory of service management: implications for managing
[4] AnyLogic®, http://www.anylogic.com (consulted in April of 2014). service improvements avoiding the “Service Jungle”, Proceedings of the XX
[5] A. Baldwin, M. Mont, S. Shiu, Using modeling and simulation for policy International Conference System Dynamics Society, 2002.
decision support in identity management, Proceedings of the IEEE Inter- [32] I. Goiri, J. Guitart, J. Torres, Economic model of a cloud provider operat-
national Symposium Policies for Distributed Systems and Networks, ing in a federated cloud, Information System Frontiers 14 (2012) (2012)
2009, pp. 17–24. 827–843.
[6] Y. Barlas, Formal aspects of model validity and validation in system dynamics, [33] P. Gokhale, R. Kumar, T. Das, A. Gumaste, Cloud computing over metropolitan area
System Dynamics Review, 12(3), John Wiley & Sons, 1996, pp. 183–210. WDM networks: the light-trails approach, Proceedings of the IEEE Global Telecom-
[7] C. Bartolini, C. Stefanelli, M. Tortonesi, SYMIAN: a simulation tool for the optimiza- munications Conference, 2010, pp. 1–6.
tion of the IT incident management process, Proceedings of the IFIP/IEEE Interna- [34] G. Grabarnik, H. Ludwi, L. Schwartz, Management of service process QoS in a
tional Workshop on Distributed Systems: Operations and Management: service provider–service supplier environment, Proceedings of the 9th IEEE Inter-
Managing Large-Scale Service Deployment, 2008, pp. 83–94. national Conference on E-Commerce Technology and the 4th IEEE International
[8] C. Bartolini, C. Stefanelli, M. Tortonesi, Business-impact analysis and simula- Conference on Enterprise Computing, E-Commerce and E-Services, 2007, pp.
tion of critical incidents in IT service management, Proceedings of the Inter- 543–550.
national Conference on Symposium on Integrated Network Management, [35] G. Grabarnik, H. Ludwig, L. Shwartz, Dynamic management of outsourced service
2009, pp. 9–16. processes' QoS in a service provider–service supplier environment, Proceedings
[9] C. Bartolini, C. Stefanelli, M. Tostonesi, SYMIAN: analysis and performance of the 3rd IEEE/IFIP International Workshop on Business-driven IT Management,
improvement of the IT incident management process, IEEE Transactions on 2008, pp. 81–88.
Network and Service Management 7 (3) (2010) 132–144 (2010). [36] A. Gregoriades, B. Karakostas, Unifying business objects and systems dynamics as a
[10] C. Bartolini, D. Stefanelli, D. Targa, M.A. Tortonesi, Web-based what-if scenario paradigm for developing decision support systems, Decision Support Systems 37
analysis tool for performance improvement of IT support organizations, Proceed- (2004) 307–3011.
ings of the International Conference on Network and Service Management, 2011, [37] W. Hailegiorgis, D. Williams, Modelling capacity requirements for BBC IT storage
pp. 1–5. area network: experience and research, Proceedings of the 22nd International
[11] C. Bartsch, M. Mevius, A. Oberweis, Simulation environment for IT service support Conference System Dynamics Society, 2004.
processes, Proceedings of the International Conference on Information, Process and [38] M. Hoyer, D. Schlitt, Proactive dynamic resource management in virtualized data
Knowledge Management, 2010, pp. 23–31. centers, Proceedings of the 2nd International Conferencia on Energy-Efficient
[12] C. Bongsug, A complexity theory approach to IT-enabled services (IESs) and service Computing and Networking, 2012, pp. 11–20.
innovation: business analytics as an illustration of IES, Decision Support Systems [39] W. Hu, A. Almansoori, P.K. Kannan, S. Azarm, Z. Wang, Corporate
57 (2014) 1–10. dashboards for integrated business and engineering decisions in oil refin-
[13] C. Cao, Z. Zhan, Incident management process for the cloud computing environ- eries: an agent-based approach, Decision Support Systems 52 (2012)
ments, Proceedings of the IEEE International Conference on Cloud Computing 729–741.
and Intelligence Systems, 2011, pp. 225–229. [40] O. Hühn, C. Markl, M. Bichler, On the predictive performance of queuing network
[14] Capability Maturity Model Integration (CMMI), http://www.sei.cmu.edu/cmmi/ models for large-scale distributed transaction processing systems, Information
(consulted in April of 2014). Technology and Management 10 (2–3) (2009) 135–149.
[15] A. Cater-Steel, W.G. Tan, M. Toleman, Using institutionalism as a lens to examine [41] ISO/IEC 20000-1, Information Technology — Service Management — Part 1: Service
ITIL adoption and diffusion, Proceedings of ACIS, 2009, (paper 73). Management Systems Requirements, 2011.
[16] D.C. Chatfield, T.P. Harrison, J.C. Hayya, SISCO: an object-oriented supply chain sim- [42] ISO/IEC 20000-2, Information Technology — Service Management — Part 2:
ulation system, Decision Support Systems 42 (2006) 422–434. Guidance on the Application of Service Management Systems, 2012.
50 E. Orta et al. / Decision Support Systems 66 (2014) 36–51

[43] ITIL, http://www.itil-officialsite.com/ 2011 (consulted in April of 2014). [72] Office of Government Commerce (OGC), ITIL® Service Design, 2011.
[44] ITIL®, Glossary and Abbreviations, 2011. [73] Office of Government Commerce (OGC), ITIL® Service Operation, 2011.
[45] S. Jakoubi, S. Tjoa, S. Goluch, G. Kitzler, A formal approach towards risk-aware [74] Office of Government Commerce (OGC), ITIL® Service Strategy, 2011.
service level analysis and planning, International Conference on Availability, [75] Office of Government Commerce (OGC), ITIL® Service Transaction, 2011.
Reliability and Security, 2010, pp. 180–187. [76] E. Orta, M. Ruiz, M. Toro, Analyzing strategic business rules through simulation
[46] H.L. Jung, S.H. Young, K.Y.S. Chanchoon, C. Minju, J. Taikyeong, L.P. modeling, Proceedings of the IFIP Conference on E-Business, E-Services and
Gyung, H. Jun, IT service management case base & simulation analysis E-Society, 2009, pp. 357–368.
and design: systems dynamics approach, Proceedings of the Internation- [77] E. Orta, M. Ruiz, M. Toro, A system dynamics approach to web service capacity
al Conference on Convergence Information Technology, 2007, pp. management, Proceedings of the European Conference on Web Services, 2009,
1559–1566. pp. 109–117.
[47] S. Karapetrovic, W. Willborn, Techniques connecting internal management [78] H. Parvin, A. Bose, M. Van Oyen, Priority-based routing with strict deadlines and
systems in service organization, Managing Service Quality 8 (4) (1998) server flexibility under uncertainty, Proceedings of the Winter Simulation Confer-
256–271. ence, 2009, pp. 3181–3187.
[48] M.I. Kellner, R.J. Madachy, D.M. Raffo, Software process simulation modeling: [79] D. Peng, Y. Yuan, X. Wang, A. Zhou, Capacity planning for composite web services
why? what? how? The Journal of Systems and Software 46 (2/3) (1999) using queuing network-based models, Proceedings of the 5th International Confer-
91–105. ence in Advances in Web-Age Information Management, LNCS, 3129, 2004, pp.
[49] A.H. Khataie, A.A. Bilgat, J.J. Segovia, Activity-based costing and management ap- 439–448.
plied in a hybrid decision support system for order management, Decision Support [80] T. Popkov, Y. Karpov, Using simulation modeling for IT cost analysis, 10th HP Open
Systems 52 (2011) 142–156. View University Association Workshop, 2003.
[50] J.Y. Kim, K. Altinkemer, A. Bisi, Yield management of workforce for IT service [81] D.J. Power, Decision Support Systems: Concepts and Resources for Managers,
providers, Decision Support Systems 53 (1) (2012) 23–33. Quorum Books, Westport, Conn, 2002.
[51] R. Krebs, C. Momm, S. Kounev, Metrics and techniques for quantifying perfor- [82] D.J. Power, R. Sharda, Model-driven decision support systems: concepts and
mance isolation in cloud environments, Proceedings of the 8th International research directions, Decision Support Systems 43 (3) (2007) 1044–1061.
ACM SIGSOFT Conference on the Quality of Software Architectures, 2012, [83] S. Robinson, Conceptual modeling for simulation: issues and research require-
pp. 91–100. ments, Proceedings of the Winter Simulation Conference, 2006, pp. 792–800.
[52] M. Kuncova, P. Wasserbauser, Discrete event simulation—HelpDesk model in [84] I. Rodero, J. Jaramillo, A. Quiroz, M. Parashar, F. Guim, S. Poole, Energy-
SIMPROCESS, Proceedings of the European Conference on Modelling and Simula- efficient application-aware online provisioning for virtualized clouds and
tion, 2007, pp. 105–110. data centers, Proceedings of the International Green Computing Conference,
[53] G. Landi, N. Ciulli, J. Buyse, K. Georgakilas, M. Anastasopoulos, A. Tzanakaki, C. 2010, pp. 31–45.
Develder, E. Escalona, D. Parniewicz, A. Binczewski, B. Belter, A network control [85] F. Salfner, K. Wolter, A Petri model for service availability in redundant
plane architecture for on-demand co-provisioning of optical network and IT computing systems, Proceedings of the Winter Simulation Conference,
services, Proceedings of the Future Network & Mobile Summit Conference, 2012, 2009, pp. 819–826.
pp. 1–8. [86] J.M. Sarriegi, J. Santos, J.M. Torres, D. Imizcoz, A.L. Plandolit, Modeling security
[54] A. Law, How to conduct a successful simulation study, Proceedings of the Winter management of information systems: analysis of an ongoing practical case,
Simulation Conference, 2003, pp. 66–70. Proceedings of the 24th International Conference of the System Dynamics So-
[55] A.M. Law, How to build valid and credible simulation models, Proceedings of the ciety, 2006, (http://www.systemdynamics.org/conferences/2006/proceed/
Winter Simulation Conference, 2009, pp. 24–33. index.htm ).
[56] Y. Lee, L. An, S. Bagchi, D. Connors, S. Kapoor, Discrete event simulation [87] L. Schmid, J. Gallati, K. Hügel, M. Loher, Success dynamics - a concept for building
modelling of resource planning and service order execution for service system dynamics models as decision support within strategic management, the
business, Proceedings of the 2007 Winter Simulation Conference, 2007, 30th International Conference of the System Dynamics Society, Tutorial Lectures
2007, pp. 2227–2233. 2008. http://www.systemdynamics.org/conferences/2012/proceed/papers/P1101.
[57] T. Li, R.J. Kauffman, Adaptive learning in service operations, Decision Support pdf .
Systems 53 (2) (2012) 306–319. [88] T. Setzer, K. Bhattacharya, H. Ludwig, Decision support for service transition
[58] X. Li, Z. Zhan, S. Guo, L. Zhang, IT incident assign algorithm based on the difference management, Proceedings of the Network Operations and Management Sympo-
between support groups, Proceedings on the International Conference on sium, 2008, pp. 200–207.
Advanced Intelligence and Awareness Internet, 2010, pp. 319–323. [89] T. Setzer, K. Bhattacharya, H. Ludwig, Change scheduling based on business impact
[59] X. Luo, K. Kar, S. Sahu, P. Pradhan, A. Shaikh, On improving change management analysis of change-related risk, IEEE Transactions on Network and Service
process for enterprise IT services, Proceedings of the IEEE International Conference Management 7 (1) (2010) 58–71.
on Services, Computing, 2008, pp. 341–348. [90] M. Shayne, M. Kunc, J. Morecroft, S. Rockart, System dynamics and strategy, System
[60] J. Magott, M. Woda, Evaluation of SOA security metrics using attack graphs, Dynamics Review, 24 (4), John Wiley & Sons, Ltd., 2009, pp. 407–429.
Proceedings of the Third International Conference on DepCos-RELCOMEX, 2008, [91] A. Shrestha, A. Cater-Steel, M. Toleman, W.G. Tan, A decision support tool to define
pp. 277–284. scope in IT service management process assessment and improvement, LNCS 7939
[61] M. Marrone, L.M. Kolbe, Uncovering ITIL claims: IT executives' perception on (2013) 308–323.
benefits and Business–IT alignment, International Systems and E-business [92] E. Silva, E.Y. Chaix, Business and IT governance alignment simulation essay on a
Management 9 (3) (2011) 363–380. business process and IT service model, Proceedings of the 41st Annual Hawaii
[62] M. Marrone, L.M. Kolbe, Impact of IT service management frameworks on the IT or- International Conference on Systems Science, 2008, pp. 434–445.
ganization. An empirical study on benefits, challenges and processes, Business & [93] A. Squicciarini, M. Casassa-Mont, S. Rajasekaran, Using modeling and simulation to
Information System Engineering 3 (1) (2011) 5–18. evaluate enterprises' risk exposure to social networks, IEEE Computer 44 (1)
[63] B. Martens, F. Teuteberg, Decision-making in cloud computing environments: (2011) 66–73.
a cost and risk based approach, Information Systems Frontiers 14 (4) (2012) [94] J.D. Sterman, Business Dynamics. Systems Thinking and Modeling for a Complex
871–893. World, McGraw-Hill, 2000.
[64] I.J. Martínez, G.P. Richardson, Best practices in system dynamics modeling, [95] A.A. Tako, S. Robinson, The application of discrete event simulation and system
Proceedings of the 19th International Conference of the Systems Dynamics dynamics in the logistics and supply chain context, Decision Support Systems 52
Society, 2001. (2012) 802–815.
[65] I.J. Martinez-Moyano, E. Rich, S. Conrad, D.F. Andersen, T.R. Stewart, A behavioral [96] S. Thanheiser, L. Liu, H. Schmeck, SimSOA: an approach for agent-based simulation
theory of insider-threat risks: a system dynamics approach, Transactions on and design-time assessment of SOC-based IT systems, Proceedings of the Sympo-
Modeling and Computer Simulation 18 (2) (2008) (article no. 7). sium on Applied Computing, 2009, pp. 2162–2169.
[66] O. Mazhelis, Tyrväinen, Economic aspects of hybrid cloud infrastructure: user [97] T.M. Theresa, M. Edgington, T.S. Raghu, Ajay S. Vinze, Using process mining to iden-
organization perspective, Information System Frontiers 14 (4) (2012) tify coordination patterns in IT service management, Decision Support Systems 49
845–869. (2) (2010) 175–186.
[67] M. Mont, R. Brown, S. Arnell, N. Passingham, Security analytics: risk analysis for an [98] Vensim DSS®, http://www.vensim.com (consulted in April of 2014).
organisation's incident management process, HP Laboratories, Technical Report [99] D. Villela, Provisioning servers in the application tier for e-commerce systems,
HPL-2012-206, 2012. ACM Transactions on Internet Technology 7 (1) (2007) (article no. 7).
[68] A. Moore, A.R. Antao, Improving management of information technology: system dy- [100] L. Wang, A. Sahai, J. Pruyne, A model-based simulation approach to error analysis
namics analysis of IT controls in context, Proceedings of the 24th International Con- of IT services, Proceedings of the 10th IFIP/IEEE International Symposium on
ference of the System Dynamics Society, 2006, (http://www.systemdynamics.org/ Integrated Network Management, 2007, pp. 805–808.
conferences/2006/proceed/papers/MOORE341.pdf). [101] U. Winkler, M. Fritzsche, W. Gilani, A. Marshall, A model-driven framework for
[69] A. Moore, R. Antao, Modeling and analysis of information technology change and process-centric business continuity management, Proceedings of the Seventh
access controls in the business context, Technical Note CMU/SEI-2006-TN-040, International Conference on the Quality of Information and Communications
Carnegie Mellon University, 2007. Technology, 2010, pp. 248–252.
[70] L. Nogueira, L.M. Pinho, Dynamic QoS adaptation of inter-dependent task [102] D. Xu, Y. Wang, X. Li, X. Qiu, ICT service composition method based on service
sets in cooperative embedded systems, Proceedings of the 2nd International catalogue model, Proceedings of the International Conference on Advanced
Conference on Autonomic Computing and Communication Systems, 2008, Intelligence and Awareness Internet, 2010, pp. 324–328.
(article no. 34.). [103] B. Yang, N. Aran, S. Zeng, R. Puri, SLA-driven applicability analysis for patch man-
[71] Office of Government Commerce (OGC), ITIL® Continual Service Improvement, agement, IFIP/IEEE International Symposium on Integrated Network Management,
2011. 2011, pp. 438–445.
E. Orta et al. / Decision Support Systems 66 (2014) 36–51 51

[104] G. Zhang, Y. Yang, A historical probability based noise generation strategy for Mercedes Ruiz holds a PhD in Software Engineering from the University of Seville, Spain.
privacy protection in cloud computing, Journal of Computer and System Sciences She is currently an Associate Professor at the University of Cadiz, Spain, where she leads
78 (5) (2012) 1374–1381. the Software Process Improvement and Formal Methods Research Group. Her research in-
[105] L. Zhang, Z. Zhan, X. Li, BDIM-based optimal design of response time SLO for SaaS, terests are: simulation-based decision support applied in Software and Services Engineer-
3rd IEEE International Conference on Broadband Network and Multimedia ing, as well as simulation-based learning and assessment. She is the author or co-author of
Technology, 2010, pp. 228–232. numerous papers in international conferences and journals. She is a member of ACM and
[106] G. Zhang, Y. Yang, X. Liu, J. Chen, A time-series pattern based noise generation of the Spanish Chapter of the ACM-SIGCSE. Her email address is mercedes.ruiz@uca.es.
strategy for privacy protection in cloud computing, Proceedings of the 12th
IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing,
2012, pp. 458–465. Nuria Hurtado has a Computer Science degree from the University of Granada (Spain)
[107] G. Zhang, Y. Yang, D. Yuan, J. Chen, A trust-based noise injection strategy for and a PhD from the University of Cádiz (Spain). She is a member of the Software Process
privacy protection in cloud, Software - Practice and Experience 42 (4) Improvement and Formal Methods (SPI&FM) Research Group, and the AIPO Association
(2012) 431–445. (Human Computer Interaction Association). Her main research interest is the application
[108] H. Zhen, C.K.M. Lee, A decision support system for procurement risk man- of simulation modeling techniques to improve interactive system usability and teamwork.
agement in the presence of sport market, Decision Support Systems 55 (1) She is author or co-author of several book chapters and papers in journals and internation-
(2013) 67–78. al conferences. Her email address is nuria.hurtado@uca.es.

Elena Orta holds a Computer Science degree from the University of Seville (Spain) and a
PhD from the University of Cádiz (Spain). Nowadays, she is an Associate Professor at the David Gawn is a PhD student at the UCA. He has a BSc (honors) in Microelectronic Systems
University of Cadiz (Spain). She is a member of the Software Process Improvement & from the University of Ulster, N. Ireland. His fields of research are modeling and simulation
Formal Methods Research Group, and itSMF Spain. She is mainly interested in decision- applied to IT Service Management processes. He most recently worked as a Service
making in IT Service Management and simulation modeling techniques. She is author or Delivery Manager in IBM Global Services, Spain. Previously he performed a variety of soft-
co-author of papers in international conferences and journals. Her email address is ware engineering roles in companies such as Visteon Corporation, Ford Motor Company,
elena.orta@uca.es. and British Telecom. His email address is david.gawn@mail.uca.es.

You might also like